encryption

(redirected from cryptanalysis)
Also found in: Dictionary, Thesaurus, Medical, Legal, Acronyms, Encyclopedia, Wikipedia.

Encryption

The coding of sensitive information for transfer online or otherwise electronically. One may encrypt data to prevent anyone other than the intended recipient from accessing it. For example, if one buys a product online and enters credit card information into an electronic form, that information is usually encrypted so hackers and potential identity thieves cannot use it for illicit purposes.

encryption

The manipulation of data to prevent accurate interpretation by all but those for whom the data is intended. Financial institutions use encryption to increase the security of data transmitted via the Internet.
Mentioned in ?
References in periodicals archive ?
His love of music and the intricacies of cryptanalysis went hand in hand as the mathematical connection between the two is strong.
Differential Cryptanalysis of the Data Encryption Standard.
com)-- He is most vividly remembered for his work on cryptanalysis during World War II, developing the so-called electro-mechanical Bombe used to determine the correct rotor and plugboard settings of the German Enigma encryptor to decrypt intercepted messages - a development said to have shortened the length of World War II by two years.
During the World War II, Alan Turing was heading a team responsible for German naval cryptanalysis.
Turing's utility as the brains of an important part of the wartime British cryptanalysis operation run out of Bletchley Park kept him on the government's payroll and out of the hands of the law during the war.
Using cryptography for data security is adopted in many of the existing systems but they use only a single algorithm for encryption and decryption, which are vulnerable to attacks by cryptanalysts and are broken at some instance by one of the various cryptanalysis techniques such as linear cryptanalysis, n-gram analysis, meet in the middle attack, brute force attack, etc.
After a cryptanalysis phase ranging over 4 years, stream ciphers were filtered in 3 phases by their performance and security.
These requirements are summarized by two questions: how secure is the generated keystream against cryptanalysis attacks and how strong is the generated keystream statistically?
Cryptanalysis and the Hiss case' in Intelligence and National Security (18:3 Autumn 2003) and 'In Re Alger Hiss: A Final Verdict from the Archives of the KGB', in Journal of Cold War Studies (11:3 Summer 2009), the latter forming part of a special issue containing approving assessments of the Vassiliev notebooks.
This is also known as code making, or encryption, as distinguished from cryptanalysis, also known as code-breaking, or decryption [1].